Problems with my GP3 :( [gpx error log posted]

Posted by Assay 
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 04:24PM
Posted by: Assay
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP3 v1.13
Verbosity level is 1
OS version info: Windows XP Service Pack 2 build 2600
Total physical memory: 1023 MB (free: 1023 MB)
Debugging gp3.exe
Process will run on CPU 0 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x7745ebbe
Exception flags: 0x00000000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
>> FTH: (828): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Injecting DLL loading code...
Injection succesful
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
>> Starting WinMain
>> Loading library
>> WM_ACTIVATE (active)(not minimized)
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000264
Start address = 0x7384a3f5
Thread local base = 0x7fffd000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000274
Start address = 0x6f3d9682
Thread local base = 0x7fffc000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000288
Start address = 0x773eec2e
Thread local base = 0x7fffb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x0000028c
Start address = 0x703ff1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x000002b8
Start address = 0x74f56f14
Thread local base = 0x7fffa000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x000002bc
Start address = 0x6f374819
Thread local base = 0x7fff9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x000002e4
Start address = 0x6f3d9682
Thread local base = 0x7fffc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x000002e8
Start address = 0x703ff1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
>> MMX Enabled
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x000002f4
Start address = 0x773ed466
Thread local base = 0x7fffc000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x0000030c
Start address = 0x756a7bbd
Thread local base = 0x7fffa000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000318
Start address = 0x773ed466
Thread local base = 0x7fff9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000320
Start address = 0x773ed466
Thread local base = 0x7fff8000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000334
Start address = 0x02c788f0
Thread local base = 0x7fff7000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000338
Start address = 0x02c788f0
Thread local base = 0x7fff6000
>> Supported FF Effects for this stick...
>> Constant>>
>> Ramp Force>>
>> Square Wave>>
>> Sine Wave>>
>> Triangle Wave>>
>> Sawtooth Up Wave>>
>> Sawtooth Down Wave>>
>> Spring>>
>> Damper>>
>> Inertia>>
>> Friction>>
>> CustomForce>>
>> End of list
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x0000033c
Start address = 0x6cba7db4
Thread local base = 0x7fff5000
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000340
Start address = 0x00523185
Thread local base = 0x7fff4000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: UNLOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000380
Start address = 0x69a0e4a1
Thread local base = 0x7fff3000
Debug event: LOAD_DLL_DEBUG_EVENT
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000388
Start address = 0x74222f69
Thread local base = 0x7fff2000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x0000038c
Start address = 0x773ed466
Thread local base = 0x7fff1000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread handle = 0x00000390
Start address = 0x69a0e4a1
Thread local base = 0x7fff0000
>> Bink init>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x00505ca8
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00d23000
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT



Edited 3 time(s). Last edit at 05/02/2012 04:29PM by Assay.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 04:27PM
Posted by: Assay
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT



Edited 1 time(s). Last edit at 05/02/2012 04:30PM by Assay.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 04:30PM
Posted by: Assay
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 04:31PM
Posted by: Assay
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
First chance exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Unhandled exception
Exception address: 0x774120d5
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Stack trace:
774120D5: Windows\SYSTEM32\ntdll.dll! RtlAllocateHeap + 32 bytes
636B93DE: Windows\AppPatch\AcXtrnal.DLL! <no symbol>
00527B9E: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
00524888: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
0052320A: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
75931114: Windows\system32\kernel32.dll! BaseThreadInitThunk + 18 bytes
7741B429: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 99 bytes
7741B3FC: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 54 bytes
Registers:
EAX=01310A60 ECX=7FFF4000 ESI=00000000
EBX=6DDF00C4 EDX=00000057 EDI=000000A0
CS:EIP=001B:774120D5
SS:ESP=0023:05B011A0 EBP=05B0120C
DS=0023 ES=0023 FS=003B GS=0000
Flags=00210293
Stack dump:
05b011a0: 000000a0 00000008 00000080 00000000 '................'
05b011b0: 00000000 00000000 00000000 00000000 '................'
05b011c0: 00000000 00000000 00000000 00000000 '................'
05b011d0: 00000000 00000000 00000000 00000000 '................'
05b011e0: 00000000 00000000 00000000 00000000 '................'
05b011f0: 00000000 00000000 00000000 00000000 '................'
05b01200: 00000000 00000000 00000000 05b0122c '............,...'
05b01210: 636b93de 6ddf00c4 00000008 000000a0 '..kc...m........'
05b01220: 00000057 00000080 00000000 05b01274 'W...........t...'
05b01230: 00527b9e 6ddf00c4 00000008 00000080 '.{R....m........'
05b01240: 00000057 00000000 05bfff78 05b012e8 'W.......x.......'
05b01250: 773dd555 00000000 00000074 05b0126c 'U.=w....t...l...'
05b01260: 75796aee 05b012e8 00526f0c 0052c9b8 '.jyu.....oR...R.'
05b01270: ffffffff 05b0129c 00524888 00000001 '.........HR.....'
05b01280: 00000080 0052c800 00000000 00527c6b '......R.....k|R.'
05b01290: 00000000 05bfff78 c0000005 05bfff88 '....x...........'
05b012a0: 0052320a c0000005 05b012c8 00526f57 '.2R.........WoR.'
05b012b0: 05b012d0 00000000 05b012d0 00000000 '................'
05b012c0: 00000000 00000000 05b013bc 05b013d8 '................'
05b012d0: 05b012f4 77406449 05b013bc 05bfff78 '....Id@w....x...'
05b012e0: 05b013d8 05b01390 05b01780 7740645d '............]d@w'
05b012f0: 05bfff78 05b013a4 7740641b 05b013bc 'x........d@w....'
05b01300: 05bfff78 05b013d8 05b01390 00526f0c 'x............oR.'
05b01310: 05bfff78 05b013bc 05bfff78 773e8b7d 'x.......x...}.>w'
05b01320: 05b013bc 05bfff78 05b013d8 05b01390 '....x...........'
05b01330: 00526f0c 000000a0 05b013bc 00000000 '.oR.............'
05b01340: 00000000 00000000 00000000 00000000 '................'
05b01350: 00000000 00000000 00000000 00000000 '................'
05b01360: 00000000 00000000 00000000 00000000 '................'
05b01370: 00000000 00000000 00000000 00000000 '................'
05b01380: 00000000 00000000 00000000 00000000 '................'
05b01390: 05bfff78 00000072 05c00000 05b01000 'x...r...........'
05b013a0: 00000000 05b01728 774062a7 00b013bc '....(....b@w....'
05b013b0: 05b013d8 05b013bc 05b013d8 c0000005 '................'
05b013c0: 00000010 00000000 774120d5 00000002 '......... Aw....'
05b013d0: 00000000 6ddf0108 0001003f 00000000 '.......m?.......'
05b013e0: 00000000 00000000 00000000 00000000 '................'
05b013f0: 00000000 0000027f 00000020 0000ffff '........ .......'
05b01400: 00483395 031d001b 00936344 00000023 '.3H.....Dc..#...'
05b01410: 00000000 00000000 00000000 00000000 '................'
05b01420: 00000000 00000000 00000000 00000000 '................'
05b01430: 00000000 00000000 00000000 00000000 '................'
05b01440: 00000000 00000000 00000000 00000000 '................'
05b01450: 9c400000 0000400c 00000000 400c9c40 '..@..@......@..@'
05b01460: 00000000 00000000 0000003b 00000023 '........;...#...'
05b01470: 00000023 000000a0 00000000 6ddf00c4 '#..............m'
05b01480: 00000057 7fff4000 01310a60 05b01728 'W....@..`.1.(...'
05b01490: 774120d5 0000001b 00210293 05b016bc '. Aw......!.....'
05b014a0: 00000023 0020027f 031d0000 00483395 '#..... ......3H.'
05b014b0: 0000001b 00936344 00000023 00001f80 '....Dc..#.......'
05b014c0: 0000ffff 00000000 00000000 00000000 '................'
05b014d0: 00000000 00000000 00000000 00000000 '................'
05b014e0: 00000000 00000000 00000000 00000000 '................'
05b014f0: 00000000 00000000 00000000 00000000 '................'
05b01500: 00000000 00000000 00000000 00000000 '................'
05b01510: 00000000 00000000 00000000 00000000 '................'
05b01520: 00000000 00000000 9c400000 0000400c '..........@..@..'
05b01530: 00000000 00000000 9c400000 0000400c '..........@..@..'
05b01540: 00000000 00000000 00000000 00000000 '................'
05b01550: 00000000 00000000 00000000 00000000 '................'
05b01560: 00000000 0036007b 00390039 00610034 '....{.6.9.9.4.a.'
05b01570: 00300064 002d0034 00330039 00660065 'd.0.4.-.9.3.e.f.'
05b01580: 0031002d 00640031 002d0030 00330061 '-.1.1.d.0.-.a.3.'
05b01590: 00630063 0030002d 00610030 00630030 'c.c.-.0.0.a.0.c.'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Process exit code = -1073741819

that's the Error Log and I install it and run it like you said
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 02, 2012 11:10PM
Posted by: mortal
Set the verbosity level to high. Did gp4 run with the installation disc in the bay, before installing the no cd?


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 03, 2012 01:30PM
Posted by: Assay
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP3 v1.13
Verbosity level is 2
OS version info: Windows XP Service Pack 2 build 2600
Total physical memory: 1023 MB (free: 1023 MB)
Debugging gp3.exe
Process created:
Process ID = 0x00001700
Process handle = 0x00000158
Main thread ID = 0x000014a0
Main thread handle = 0x00000154
Process will run on CPU 0 only
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x000014a0
Entry point = 0x00523473
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path ntdll.dll
base 0x77aa0000
size 1289536
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\kernel32.dll
base 0x768f0000
size 868352
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\KERNELBASE.dll
base 0x75d90000
size 290816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\USER32.dll
base 0x76460000
size 811520
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\GDI32.dll
base 0x75fd0000
size 304640
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\LPK.dll
base 0x75fc0000
size 26624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x765a0000
size 627200
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x75f10000
size 690688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WINSPOOL.DRV
base 0x705f0000
size 319488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\ADVAPI32.dll
base 0x762b0000
size 640000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\SYSTEM32\sechost.dll
base 0x77be0000
size 92160
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\RPCRT4.dll
base 0x76640000
size 652288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\ole32.dll
base 0x778e0000
size 1413632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x65d60000
size 531968
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\DCIMAN32.dll
base 0x65d50000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SETUPAPI.dll
base 0x77740000
size 1668608
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\CFGMGR32.dll
base 0x75de0000
size 145920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\OLEAUT32.dll
base 0x77c40000
size 571904
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\DEVOBJ.dll
base 0x75ed0000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dwmapi.dll
base 0x745b0000
size 67072
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\DINPUT.dll
base 0x6c680000
size 136704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x74020000
size 194048
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WSOCK32.dll
base 0x71360000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WS2_32.dll
base 0x77c00000
size 206336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\NSI.dll
base 0x77630000
size 8704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\DSOUND.dll
base 0x6fa80000
size 453632
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\POWRPROF.dll
base 0x75070000
size 145408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Program Files\Microprose\Grand Prix 3\binkw32.dll
base 0x10000000
size 262656
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000014a0
First chance exception
Exception address: 0x77b3ebbe
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x00523473)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\apphelp.dll
base 0x75b20000
size 292864
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\AppPatch\AcGenral.DLL
base 0x605c0000
size 2175488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SspiCli.dll
base 0x75b00000
size 99840
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SHLWAPI.dll
base 0x77a40000
size 350208
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\UxTheme.dll
base 0x748c0000
size 249856
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\samcli.dll
base 0x74320000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\MSACM32.dll
base 0x73c30000
size 72192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\VERSION.dll
base 0x750b0000
size 21504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SHELL32.dll
base 0x769e0000
size 12867584
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\sfc.dll
base 0x6f6b0000
size 2560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\sfc_os.DLL
base 0x6f6a0000
size 40960
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\USERENV.dll
base 0x75260000
size 79360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\profapi.dll
base 0x75bf0000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\urlmon.dll
base 0x760f0000
size 1230336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WININET.dll
base 0x77640000
size 981504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\iertutil.dll
base 0x766f0000
size 2072576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x75c70000
size 1151488
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\MSASN1.dll
base 0x75c60000
size 34816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\MPR.dll
base 0x71a90000
size 64000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\AppPatch\AcLayers.dll
base 0x66350000
size 559616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\AppPatch\AcXtrnal.DLL
base 0x60360000
size 211968
>> FTH: (5888): *** Fault tolerant heap shim applied to current process. This is usually due to previous crashes. ***
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x01390000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x01390000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x01390000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x01390000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x01390000
size 8835072
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x01390000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SHUNIMPL.DLL
base 0x6baa0000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\SortServer2003Compat.dll
base 0x6edd0000
size 38400
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\IMM32.DLL
base 0x75ef0000
size 118272
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\MSCTF.dll
base 0x76020000
size 828928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x00230000
size 44544
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x00230000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000014a0
First chance exception
Exception address: 0x00523473
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x00230000...
Injection succesful
Setting instruction pointer to injected code (0x00230000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Program Files\Microprose\Grand Prix 3\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x76430000
>> Starting WinMain
>> Loading library
>> WM_ACTIVATE (active)(not minimized)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\CRYPTBASE.dll
base 0x75b70000
size 36864
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\CLBCatQ.DLL
base 0x763a0000
size 522240
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000016a4
Thread handle = 0x00000264
Start address = 0x7402a3f5
Thread local base = 0x7fffd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dplayx.dll
base 0x66000000
size 213504
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000013f4
Thread handle = 0x0000026c
Start address = 0x66029682
Thread local base = 0x7fffc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dpmodemx.dll
base 0x6af10000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x70c00000
size 192000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd\comctl32.dll
base 0x74b00000
size 1680896
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6af10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x70c00000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dpmodemx.dll
base 0x66ba0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\TAPI32.dll
base 0x70c00000
size 192000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x74190000
size 37376
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000016d8
Thread handle = 0x00000288
Start address = 0x77acec2e
Thread local base = 0x7fffb000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001424
Thread handle = 0x0000028c
Start address = 0x70c0f1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001424
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x66ba0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x70c00000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dpwsockx.dll
base 0x6af10000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\mswsock.dll
base 0x75620000
size 232448
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\System32\wshtcpip.dll
base 0x75140000
size 9216
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dpnathlp.dll
base 0x668c0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\CRYPTSP.dll
base 0x75660000
size 78848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\rsaenh.dll
base 0x753b0000
size 242936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\iphlpapi.dll
base 0x73ae0000
size 103936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x73ac0000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\rasapi32.dll
base 0x741c0000
size 325120
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\rasman.dll
base 0x741a0000
size 76800
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dhcpcsvc.DLL
base 0x736f0000
size 61952
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001714
Thread handle = 0x000002b8
Start address = 0x75626f14
Thread local base = 0x7fffa000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000177c
Thread handle = 0x000002bc
Start address = 0x6af14819
Thread local base = 0x7fff9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x741c0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x741a0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x668c0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000177c
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x75140000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001714
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6af10000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000013f4
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\NLAapi.dll
base 0x73df0000
size 51712
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\DNSAPI.dll
base 0x754d0000
size 269824
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x6f140000
size 20992
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x6f130000
size 52224
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\pnrpnsp.dll
base 0x6ee70000
size 65024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\wshbth.dll
base 0x6f120000
size 35840
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
base 0x71870000
size 145280
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\PSAPI.DLL
base 0x769d0000
size 6144
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path
base 0x737d0000
size 216576
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\rasadhlp.dll
base 0x71860000
size 11776
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x73df0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6f140000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6f130000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6ee70000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6f120000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x71870000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x769d0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x737d0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\dpmodemx.dll
base 0x6af10000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\TAPI32.dll
base 0x70c00000
size 192000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001778
Thread handle = 0x000002e4
Start address = 0x66029682
Thread local base = 0x7fffc000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001414
Thread handle = 0x000002e8
Start address = 0x70c0f1ac
Thread local base = 0x7fffa000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001778
Thread exit code = 0
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001414
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6af10000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x70c00000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\aticfx32.dll
base 0x6e600000
size 513024
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\atiu9pag.dll
base 0x74370000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\atiumdag.dll
base 0x6a520000
size 3975680
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\atiumdva.dll
base 0x680e0000
size 3058688
>> MMX Enabled
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001688
Thread handle = 0x000002f4
Start address = 0x77acd466
Thread local base = 0x7fffc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\D3DIM700.DLL
base 0x63450000
size 817664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\mscat32.dll
base 0x6af10000
size 10240
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WINTRUST.dll
base 0x75e10000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\bcrypt.dll
base 0x75790000
size 80384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\bcryptprimitives.dll
base 0x752d0000
size 249680
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001684
Thread handle = 0x0000030c
Start address = 0x75ca7bbd
Thread local base = 0x7fffa000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\ncrypt.dll
base 0x757b0000
size 219136
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001448
Thread handle = 0x00000314
Start address = 0x77acd466
Thread local base = 0x7fff9000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\GPAPI.dll
base 0x751e0000
size 79872
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000172c
Thread handle = 0x0000031c
Start address = 0x77acd466
Thread local base = 0x7fff8000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6af10000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\mscat32.dll
base 0x66ba0000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x66ba0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\mscat32.dll
base 0x6af10000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x6af10000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\mscat32.dll
base 0x66ba0000
size 10240
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
base 0x66ba0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\HID.DLL
base 0x748b0000
size 22016
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000014a0
path C:\Windows\system32\WmJoyFrc.dll
base 0x02090000
size 255560
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000017f0
Thread handle = 0x00000334
Start address = 0x020988f0
Thread local base = 0x7fff7000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001454
Thread handle = 0x00000338
Start address = 0x020988f0
Thread local base = 0x7fff6000
>> Device doesn't support Saturation
>> Device doesn't support Pos/Neg Coefficients
>> Device doesn't support Pos Neg Saturation
>> Device doesn't support deadband
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000149c
Thread handle = 0x0000033c
Start address = 0x6c687db4
Thread local base = 0x7fff5000
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
>> Device supports Saturation
>> Device supports Pos Neg Coeffieicents
>> Device doesn't support Pos Neg Saturation
>> Device supports deadband
>> Using Constant force
>> In ddraw_set_screen
>> No change in cooperative level
>> changed window size
>> ddraw_set_screen finished ok.
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001580
Thread handle = 0x00000340
Start address = 0x00523185
Thread local base = 0x7fff4000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\dx\gpxpdx7.dll
base 0x09980000
size 139332
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxset.gxm
base 0x0a000000
size 20480
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxlap.gxm
base 0x09b00000
size 39424
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxtrack.gxm
base 0x09d00000
size 12288
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxcinfo.gxm
base 0x09e00000
size 37376
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsat.gxm
base 0x09c00000
size 50688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Program Files\Microprose\Grand Prix 3\gpxpdata\gxm\gpxsound.gxm
base 0x09f00000
size 15360
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\system32\imagehlp.dll
base 0x76430000
size 154624
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
base 0x76430000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\System32\MMDevApi.dll
base 0x74900000
size 213504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x00001580
path C:\Windows\System32\PROPSYS.dll
base 0x749c0000
size 988160
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000016d0
Thread handle = 0x00000380
Start address = 0x6faae4a1
Thread local base = 0x7fff3000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000016d0
path C:\Windows\system32\AUDIOSES.DLL
base 0x73cd0000
size 195584
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015f8
Thread handle = 0x00000388
Start address = 0x74902f69
Thread local base = 0x7fff2000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001508
Thread handle = 0x0000038c
Start address = 0x77acd466
Thread local base = 0x7fff1000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015b4
Thread handle = 0x00000390
Start address = 0x6faae4a1
Thread local base = 0x7fff0000
>> Bink init>> Bink init completed
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x00505ca8
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00d23000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT



Edited 1 time(s). Last edit at 05/03/2012 01:34PM by Assay.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 03, 2012 01:31PM
Posted by: Assay
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000



Edited 1 time(s). Last edit at 05/03/2012 01:34PM by Assay.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 03, 2012 01:32PM
Posted by: Assay
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108



Edited 1 time(s). Last edit at 05/03/2012 01:35PM by Assay.
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 03, 2012 01:35PM
Posted by: Assay
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
c
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
First chance exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 03, 2012 01:35PM
Posted by: Assay
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x00001580
Unhandled exception
Exception address: 0x77af20d5
Module name: 'ntdll.dll' (base 0x77aa0000, size 1289536)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x6ddf0108
Stack trace:
77AF20D5: Windows\SYSTEM32\ntdll.dll! RtlAllocateHeap + 32 bytes
603693DE: Windows\AppPatch\AcXtrnal.DLL! <no symbol>
00527B9E: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
00524888: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
0052320A: Program Files\Microprose\Grand Prix 3\GPxPatch.exe! <no symbol>
76941114: Windows\system32\kernel32.dll! BaseThreadInitThunk + 18 bytes
77AFB429: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 99 bytes
77AFB3FC: Windows\SYSTEM32\ntdll.dll! RtlInitializeExceptionChain + 54 bytes
Registers:
EAX=00210A60 ECX=7FFF4000 ESI=00000000
EBX=6DDF00C4 EDX=00000057 EDI=000000A0
CS:EIP=001B:77AF20D5
SS:ESP=0023:05C911A0 EBP=05C9120C
DS=0023 ES=0023 FS=003B GS=0000
Flags=00210293
Stack dump:
05c911a0: 000000a0 00000008 00000080 00000000 '................'
05c911b0: 00000000 00000000 00000000 00000000 '................'
05c911c0: 00000000 00000000 00000000 00000000 '................'
05c911d0: 00000000 00000000 00000000 00000000 '................'
05c911e0: 00000000 00000000 00000000 00000000 '................'
05c911f0: 00000000 00000000 00000000 00000000 '................'
05c91200: 00000000 00000000 00000000 05c9122c '............,...'
05c91210: 603693de 6ddf00c4 00000008 000000a0 '..6`...m........'
05c91220: 00000057 00000080 00000000 05c91274 'W...........t...'
05c91230: 00527b9e 6ddf00c4 00000008 00000080 '.{R....m........'
05c91240: 00000057 00000000 05d8ff78 05c912e8 'W.......x.......'
05c91250: 77abd555 00000000 00000074 05c9126c 'U..w....t...l...'
05c91260: 75d96aee 05c912e8 00526f0c 0052c9b8 '.j.u.....oR...R.'
05c91270: ffffffff 05c9129c 00524888 00000001 '.........HR.....'
05c91280: 00000080 0052c800 00000000 00527c6b '......R.....k|R.'
05c91290: 00000000 05d8ff78 c0000005 05d8ff88 '....x...........'
05c912a0: 0052320a c0000005 05c912c8 00526f57 '.2R.........WoR.'
05c912b0: 05c912d0 00000000 05c912d0 00000000 '................'
05c912c0: 00000000 00000000 05c913bc 05c913d8 '................'
05c912d0: 05c912f4 77ae6449 05c913bc 05d8ff78 '....Id.w....x...'
05c912e0: 05c913d8 05c91390 05c91780 77ae645d '............]d.w'
05c912f0: 05d8ff78 05c913a4 77ae641b 05c913bc 'x........d.w....'
05c91300: 05d8ff78 05c913d8 05c91390 00526f0c 'x............oR.'
05c91310: 05d8ff78 05c913bc 05d8ff78 77ac8b7d 'x.......x...}..w'
05c91320: 05c913bc 05d8ff78 05c913d8 05c91390 '....x...........'
05c91330: 00526f0c 000000a0 05c913bc 00000000 '.oR.............'
05c91340: 00000000 00000000 00000000 00000000 '................'
05c91350: 00000000 00000000 00000000 00000000 '................'
05c91360: 00000000 00000000 00000000 00000000 '................'
05c91370: 00000000 00000000 00000000 00000000 '................'
05c91380: 00000000 00000000 00000000 00000000 '................'
05c91390: 05d8ff78 00000072 05d90000 05c91000 'x...r...........'
05c913a0: 00000000 05c91728 77ae62a7 00c913bc '....(....b.w....'
05c913b0: 05c913d8 05c913bc 05c913d8 c0000005 '................'
05c913c0: 00000010 00000000 77af20d5 00000002 '......... .w....'
05c913d0: 00000000 6ddf0108 0001003f 00000000 '.......m?.......'
05c913e0: 00000000 00000000 00000000 00000000 '................'
05c913f0: 00000000 0000027f 00000020 0000ffff '........ .......'
05c91400: 00483395 031d001b 00936344 00000023 '.3H.....Dc..#...'
05c91410: 00000000 00000000 00000000 00000000 '................'
05c91420: 00000000 00000000 00000000 00000000 '................'
05c91430: 00000000 00000000 00000000 00000000 '................'
05c91440: 00000000 00000000 00000000 00000000 '................'
05c91450: 9c400000 0000400c 00000000 400c9c40 '..@..@......@..@'
05c91460: 00000000 00000000 0000003b 00000023 '........;...#...'
05c91470: 00000023 000000a0 00000000 6ddf00c4 '#..............m'
05c91480: 00000057 7fff4000 00210a60 05c91728 'W....@..`.!.(...'
05c91490: 77af20d5 0000001b 00210293 05c916bc '. .w......!.....'
05c914a0: 00000023 0020027f 031d0000 00483395 '#..... ......3H.'
05c914b0: 0000001b 00936344 00000023 00001f80 '....Dc..#.......'
05c914c0: 0000ffff 00000000 00000000 00000000 '................'
05c914d0: 00000000 00000000 00000000 00000000 '................'
05c914e0: 00000000 00000000 00000000 00000000 '................'
05c914f0: 00000000 00000000 00000000 00000000 '................'
05c91500: 00000000 00000000 00000000 00000000 '................'
05c91510: 00000000 00000000 00000000 00000000 '................'
05c91520: 00000000 00000000 9c400000 0000400c '..........@..@..'
05c91530: 00000000 00000000 9c400000 0000400c '..........@..@..'
05c91540: 00000000 00000000 00000000 00000000 '................'
05c91550: 00000000 00000000 00000000 00000000 '................'
05c91560: 00000000 0036007b 00390039 00610034 '....{.6.9.9.4.a.'
05c91570: 00300064 002d0034 00330039 00660065 'd.0.4.-.9.3.e.f.'
05c91580: 0031002d 00640031 002d0030 00330061 '-.1.1.d.0.-.a.3.'
05c91590: 00630063 0030002d 00610030 00630030 'c.c.-.0.0.a.0.c.'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000016d0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000016a4
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015b4
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000149c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001454
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000017f0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001580
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000014a0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001508
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015f8
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000172c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001448
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001684
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001688
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x000016d8
Process exit code = -1073741819
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 04, 2012 12:08AM
Posted by: mortal
There are still no screen resolutions in your log. Delete the f1graphics.cfg and retest. Otherwise, I really do not know, the log contains nothing that really tells me anything. Sorry. :-(


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 04, 2012 02:45PM
Posted by: Assay
There's no f1graphics.cfg file - but I'm really thankful that you spend you time in my stupid problem, thanks!
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 06, 2012 10:44PM
Posted by: pirx
hi,

posted days ago but got lost -again & maybe stupid:

have you ever thought the CD could have an error? dark in my mind, when i remember student times and installed GP3 from a disk-backupCD and i had the same error-messg. when i used a different CD everything was ok.. but i´m not quite shure, long ago

p)
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 06, 2012 11:08PM
Posted by: mortal
It is possible. You must get GP3 to run of a vanilla installation, straight off the disc. Otherwise you'll get nowhere.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 08, 2012 05:27PM
Posted by: Assay
As mortal said: It's impossible, because on an other computer it runs very fine (and right now I play it on that, even it's very... not powerful ^^)
Re: Problems with my GP3 :( [gpx error log posted]
Date: May 09, 2012 12:43PM
Posted by: pirx
..when you have a working installation on your 2nd comp why not just copy it as it is (the whole game dir) to your non working comp and use registrytool?
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy